US11225222B2 - Vehicle access and power management systems and methods via machine learning - Google Patents

Vehicle access and power management systems and methods via machine learning Download PDF

Info

Publication number
US11225222B2
US11225222B2 US16/377,697 US201916377697A US11225222B2 US 11225222 B2 US11225222 B2 US 11225222B2 US 201916377697 A US201916377697 A US 201916377697A US 11225222 B2 US11225222 B2 US 11225222B2
Authority
US
United States
Prior art keywords
vehicle
identification device
environment
pattern
recited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US16/377,697
Other versions
US20200198577A1 (en
Inventor
Jason Brian Schwegler
Michael Eric Pierfelice
Brian James Marlett
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Continental Automotive Systems Inc
Original Assignee
Continental Automotive Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Continental Automotive Systems Inc filed Critical Continental Automotive Systems Inc
Priority to US16/377,697 priority Critical patent/US11225222B2/en
Assigned to CONTINENTAL AUTOMOTIVE SYSTEMS, INC. reassignment CONTINENTAL AUTOMOTIVE SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Marlett, Brian James, PIERFELICE, MICHAEL ERIC, SCHWEGLER, Jason Brian
Publication of US20200198577A1 publication Critical patent/US20200198577A1/en
Application granted granted Critical
Publication of US11225222B2 publication Critical patent/US11225222B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/241Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/01Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/40Features of the power supply for the anti-theft system, e.g. anti-theft batteries, back-up power supply or means to save battery power
    • B60R25/403Power supply in the vehicle
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B81/00Power-actuated vehicle locks
    • E05B81/54Electrical circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/1003Alarm systems characterised by arm or disarm features

Definitions

  • This disclosure is directed generally to vehicle access systems, and more particularly to vehicle access and power management systems and methods via machine learning.
  • Vehicles communicate with identification devices through a variety of communication interfaces.
  • Vehicles and identification devices include environment detection sensors.
  • a method for access to a vehicle includes receiving data from an identification device related to at least one device environment sensor of the identification device. At least one pattern associated with the received data is identified. An environment of the identification device based on feedback from the at least one device environment sensor is determined. The environment to the at least one pattern is compared. In response to the comparing step, access to the vehicle is allowed or denied.
  • the method includes, in response to the comparing step, altering a search and listen pattern between the vehicle and the identification device.
  • the method includes, in response to the comparing step, changing a power condition of a device of the vehicle.
  • the device is a transceiver associated with a communication interface between the vehicle and the identification device.
  • changing a power condition includes powering up the device.
  • changing a power condition includes powering down the device.
  • the method includes receiving data from the vehicle related to at least one vehicle environment sensor of the vehicle, identifying a second pattern associated with the received vehicle environment data, determining a vehicle environment of the vehicle based on feedback from the at least one vehicle environment sensor, and comparing the vehicle environment to the second pattern, and the allowing or denying access step is in response to the comparing the vehicle environment step.
  • the identifying the pattern step is performed using machine learning.
  • the machine learning utilizes an algorithm and model programmed into an ECU system of the vehicle.
  • a method for power management of a vehicle includes receiving data from an identification device related to at least one device environment sensor of the identification device.
  • the method includes identifying at least one pattern associated with the received data.
  • the method includes determining an environment of the identification device based on feedback from the at least one device environment sensor.
  • the method includes, comparing the environment to the at least one pattern.
  • the method includes, in response to the comparing, changing a power condition of a device of the vehicle.
  • the device is a transceiver associated with a communication interface between the vehicle and the identification device.
  • the changing a power condition includes powering up the device.
  • the changing a power condition includes powering down the device.
  • the method in response to the comparing step, includes altering a search and listen pattern between the vehicle and the identification device.
  • the method includes identifying that the identification device is stationary and charging and reducing a frequency of a search and listen pattern between the vehicle and the identification device.
  • a power management and access system for a vehicle includes an ECU system. At least one lock is in communication with the ECU system. One or more devices is in communication with the ECU system.
  • the ECU system is configured to utilize machine learning to receive data from an identification device related to at least one device environment sensor of the identification device, identify at least one pattern associated with the received data, determine an environment of the identification device based on feedback from the at least one device environment sensor, compare the environment to the at least one pattern, and, in response to the comparison, send a signal to control the at least one lock to allow or deny access to the vehicle.
  • the ECU system is configured to change a power condition of the one or more devices in response to the comparison.
  • the ECU system is configured to alter a search and listen pattern between the vehicle and the identification device in response to the comparison.
  • FIG. 1 schematically illustrates an example vehicle access system.
  • FIG. 2 schematically illustrates communication of the example vehicle access system of FIG. 1 .
  • FIG. 3 schematically illustrates example interfaces and environment sensors of a vehicle.
  • FIG. 4 schematically illustrates example interfaces and environment sensors of an identification device.
  • FIG. 5 illustrates a flowchart of an example method for access of a vehicle.
  • FIG. 6 illustrates a flowchart of an example method for power management of a vehicle.
  • FIG. 1 schematically illustrates an example vehicle access and power management system 10 in a vehicle 12 .
  • the vehicle 12 may include one or more locks 14 , such as door locks in the example shown, operable to engage or disengage to deny or allow access to the vehicle 12 .
  • the locks 14 are controllable by control signals from an engine control unit (ECU) system 16 .
  • the ECU system 16 may include one or more individual electronic control units that control one or more electronic systems or subsystems within the vehicle 12 .
  • the ECU system 16 includes a vehicle access rights management electronic control unit.
  • two locks 14 are shown in the illustrative example, more or fewer locks 14 may be utilized.
  • the ECU system 16 communicates with an identification device 24 , in some examples to allow or deny access to the vehicle 12 , as explained further below.
  • Some example identification devices 24 may include smartphones or other handheld or wearable devices.
  • the ECU system 16 may alternatively or additionally be in communication to change the power condition of devices 18 , such as powering up and/or powering down the devices 18 , as shown schematically.
  • the devices 18 are transceivers associated with interfaces 26 of communication between the ECU system 16 and the identification device 24 .
  • the ECU system 16 may change the power condition of a device 18 based on communication with the identification device 24 .
  • the ECU system 16 may include one or more processors that executes, and memory that stores, computer-executable instructions for performing the various methods, functions, protocols, procedures, etc., described herein.
  • the memory may include volatile, non-volatile memory, solid state memory, flash memory, random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electronic erasable programmable read-only memory (EEPROM), other variants, combinations thereof, and/or any other type(s) of memory suitable for providing the described functionality and/or storing computer-executable instructions for execution by the processor.
  • RAM random-access memory
  • ROM read-only memory
  • PROM programmable read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electronic erasable programmable read-only memory
  • FIG. 2 schematically illustrates communication between the vehicle 12 and the identification device 24 through one or more interfaces 26 .
  • Example interfaces 26 may include one or more of LTE, Wi-Fi, Bluetooth Low Energy (BLE), Near-field communication, Qi, and GPS.
  • the vehicle 12 includes one or more vehicle environment sensors 28 .
  • the identification device 24 includes one or more identification device environment sensors 30 .
  • the vehicle 12 and the identification device 24 may communicate data based on readings from the sensors 28 , 30 .
  • the ECU system 16 is in communication with the identification device 24 and the vehicle environment sensors 28 .
  • the ECU system 16 can allow or deny access to the vehicle 12 , change a power condition (e.g., power up or power down) of certain functions of the vehicle 12 to conserve power, and/or alter a search and listen pattern, in which the vehicle 12 periodically sends signals to and receives signals from the identification device 24 .
  • a power condition e.g., power up or power down
  • a search and listen pattern in which the vehicle 12 periodically sends signals to and receives signals from the identification device 24 .
  • the interfaces 26 A of the vehicle 12 may include LTE 31, Wi-Fi 32, BLE 34, GPS 36, Qi 38, and Near-field communication 40 .
  • the vehicle environment sensors 28 may include one or more of a temperature sensor 42 , a light sensor 44 , a camera 46 , a radar sensor 48 , a microphone 50 , and an ultrasonic sensor 52 .
  • Other sensors 28 and interfaces 26 A may be used in some examples.
  • the interfaces 26 B of the identification device 24 may include LTE 31, Wi-Fi 32, BLE 34, GPS 36, Qi 38, and Near-field communication 40 .
  • the device environment sensors 30 may include one or more of a microphone 54 , a temperature sensor 56 a light sensor 58 , a camera 60 , an accelerometer 62 , and a gyroscope 64 .
  • Other sensors 30 and interfaces 26 B may be used in some examples.
  • Interface 26 selection and sensor 28 , 30 utilization can vary for each environment that the vehicle 12 and identification device 24 are located in.
  • information from the sensors 28 , 30 can indicate the proximity of the vehicle 12 to the identification device 24 .
  • the system 10 analyzes this data to determine whether the vehicle 12 and identification device 24 are in close proximity to one another, which can be used to allow or deny access to the vehicle 12 , to change a power condition of certain functions of the vehicle 12 to use less power, and/or to alter a search and listen pattern.
  • the system 10 utilizes machine learning to learn from data from the sensors 28 , 30 , identify patterns associated with the data, and make decisions to execute various vehicle 12 functions with minimal human intervention.
  • the system 10 such as through the ECU system 16 , may use machine learning to understand paths and environment transitions of the identification device 24 after leaving the vehicle 12 and execute various vehicle functions in response.
  • the system 10 may utilize machine learning to receive data from an identification device 24 from one or more of the sensors 30 , identify one or more patterns associated with the received data, determine an environment of the identification device 24 based on feedback from the one or more sensors 30 , compare the environment to the one or more patterns, and, in response, allow or deny access to the vehicle 12 .
  • the vehicle may change the power condition of a device 18 .
  • the vehicle 12 may alter a search and listen pattern relative to the identification device 24 .
  • the machine learning may be based on data received from vehicle environment sensors 28 .
  • the system 10 may use machine learning based on sensor status, real time changes to vehicle 12 and identification device 24 environments, and historical data to predict proximity of the vehicle 12 and the identification device 24 .
  • the system 10 may know through machine learning that the identification device 24 will not be used to gain access to the vehicle 12 for some time, and may deny access to the vehicle 12 , power down devices 18 , and/or reduce a polling frequency of a search and listen pattern to conserve power.
  • FIG. 5 illustrates a flowchart of an example method 100 for access of a vehicle 12 , that may be utilized with the system 10 disclosed.
  • the method 100 includes, at 102 , receiving data from an identification device 24 from one or more device environment sensors 30 .
  • the method 100 includes identifying one or more patterns associated with the received data.
  • the method 100 includes determining an environment of the identification device 24 based on feedback from the one or more device environment sensors 30 .
  • the method 100 includes comparing the environment to the one or more patterns.
  • the method 100 includes, in response to the step 108 , allowing or denying access to the vehicle 12 .
  • One or more of the steps of the method 100 be performed utilizing machine learning, such as with the ECU system 16 in some examples.
  • the method 100 includes, in response to step 108 , altering a search and listen pattern between the vehicle and the identification device. In some examples, the method 100 includes, in response to step 108 , changing a power condition of a device 18 .
  • the method 100 may be based on vehicle environment sensor 28 data.
  • the method 100 may include receiving data from the vehicle 12 related to one or more vehicle environment sensors 28 of the vehicle 12 , identifying a second pattern associated with the received vehicle environment data, determining a vehicle environment of the vehicle 12 based on feedback from the one or more vehicle environment sensors, and comparing the vehicle environment to the second pattern.
  • the allowing or denying access step may be in response to the comparing the vehicle environment step.
  • FIG. 6 illustrates a flowchart of an example method 200 for power management of a vehicle 12 , that may be utilized with the system 10 disclosed.
  • the method 200 includes, at 202 , receiving data from an identification device 24 from one or more device environment sensors 30 .
  • the method 200 includes identifying one or more patterns associated with the received data.
  • the method 200 includes determining an environment of the identification device 24 based on feedback from the one or more device environment sensors 30 .
  • the method 200 includes comparing the environment to the one or more patterns.
  • the method 200 includes, in response to the step 208 , changing a power condition of a device 18 of the vehicle 12 .
  • the method 200 includes, at 212 , in response to 208 , altering a search and listen pattern between the vehicle 12 and the identification device 24 .
  • Steps from the method 100 and the method 200 may be combined in some examples.
  • the identification device 24 may be within close proximity to the vehicle 12 .
  • the system 10 may utilize machine learning to understand that the identification device 24 should not be expected to be used to gain access to the vehicle 12 soon.
  • the system may learn this from a detection that the identification device 24 is stationary and/or a detection that the identification device 24 is charging. For example, instead of keeping the search strategy in a quick response mode, if the identification device 24 is not moving or sitting on a wireless charging pad, based on feedback from various device environment sensors 30 , then the vehicle 12 can switch into a longer search and listen pattern until the identification device 24 notifies the vehicle 12 of a status or environment change.
  • the system 10 may consider the time of day when the identification device 24 would normally start to be utilized.
  • temperature sensors 42 , 56 and light sensors 44 , 58 on the identification device 24 and the vehicle 12 can be compared for alignment to see if both vehicle 12 and device 24 are in the same environment, such as an indoor or outdoor environment.
  • the light sensor 58 can gate the temperature sensor 56 to know if the device is in pocket, bag, or out in the open.
  • microphones 50 , 54 can monitor the level of noise in the background, which can be used to compare the noise environment of the vehicle 12 to the noise environment to the identification device 24 .
  • one or more of accelerometer 62 , compass & gyroscope 64 data can be used to track how the identification device 24 moved toward and/or away from the vehicle 12 . These sensors used to classify walking, running, standing, etc.
  • radars and ultrasonic tracking can monitor the path of motion of the user and compare this with the identification device 24 path determination.
  • the vehicle 12 can use its sensors 28 , such as Advanced Driver Assist Sensors like cameras, RADAR, and LiDAR, to observe the trajectory the user takes take when leaving the vehicle 12 . With repeated visits to the same location, which may be sensed with GPS in some examples, the vehicle 12 can begin to predict the departure path, time to return, and approach path of the authorized user.
  • the identification device 24 may also have sensors 30 tracking the path as the identification device 24 leaves the vehicle 12 .
  • the identification device 24 can then collect the sensor 30 data over repeated visits to predict which sensor inputs are principle components to an algorithm that reliably classifies segments of the path and which of those segments can be used in an algorithm to predict a trajectory of the identification device 24 , such as when the user will return to the vehicle 12 .
  • the pairings of the observed trajectory from the vehicle 12 and the sensed trajectory of the device 24 may vary from day to day, such as when the user parks in various nearby locations and enters or exits through a variety of access points of their destination.
  • the identification device 24 shares its prediction of when and how it expects the user to be on his or her way to return to the vehicle 12 . This sharing may be accomplished via indirect or direct means, depending on the proximity of the identification device 24 and the vehicle 12 .
  • Once the vehicle 12 has a high confidence input from the identification device 24 on a returning trajectory of the user it can use its relevant sensors 28 and devices 18 , such as wireless receivers, to confirm the approach of the user and the identification device 24 .
  • the path segment classification may occur locally on the identification device 24 , on an algorithm on the vehicle 12 , or on a cloud service that incorporates data from many users and vehicles to continually tune a generic algorithm.
  • algorithm tuning benefits from large anonymous populations of users with highly correlated data for a given location.
  • a set of algorithms may be highly optimized for the identification devices 24 and vehicles 12 parked in large common locations and are available to be exchanged with the vehicle 12 and the identification devices 24 in those areas. Blended approaches may also be achieved where locations are classified as public or private.
  • users may hold their path data and associated approach algorithms within their devices 24 and vehicles 12 for private locations and share those where they can benefit from and contribute to the crowdsourced solutions.
  • the system 10 may prioritize among multiple authorized users.
  • the vehicle 12 may have a confidence level for each potential user and manage its sensor state according to their proximity For instance, if one user leaves the vehicle 12 in a long term parking situation and uses another form of transportation to move significantly farther away than the other authorized users, then the vehicle 12 prepares for the most relevant case of the nearest authorized user to approach.
  • the system 10 may focus on the prioritized user for the search and listen function.
  • the system 10 may default to a polling or search strategy that matches with a “closest authorized user” priority; however, the system 10 would have the capability to invert the priority to force the system to set the search strategy to a lower power mode based on the request of the last user who has to return to the vehicle 12 on a very specific path which takes more time into consideration. Based on the changing schedules, the priority may be restored on request. This will have the effect of enabling a much lower power state and reduced availability of the wireless access systems to attack. The other authorized users with sufficient permissions are also able restore their “on approach” confidence threshold as needed.
  • the system 10 may learn that a first authorized user's device 24 is in close proximity to the vehicle 12 , and a second authorized user's device 24 is located farther away, such as in another city, state, province, country, etc. In these examples, the vehicle 12 may choose not to react to the second authorized user's device 24 .
  • Vehicles 12 and identification devices 24 can further enhance the proximity detection through their ability to recognize changes in their environments to determine if the search and listen functions of the access system should be available and authorize actions. This could be any combination of wireless interface measurements or environment detection sensors available to the vehicle and the smart device.
  • the system 10 can adapt the search and listen management to the environmental state, changes through that environment, user behaviors on the path through the environment, and historical data on paths through the environment.
  • the systems and methods disclosed provide enhanced access, security, and power management through the use of machine learning.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)

Abstract

A method for access to a vehicle includes receiving data from an identification device related to at least one device environment sensor of the identification device. At least one pattern associated with the received data is identified. An environment of the identification device based on feedback from the at least one device environment sensor is determined. The environment to the at least one pattern is compared. In response to the comparing step, access to the vehicle is allowed or denied.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims priority to U.S. Provisional Application No. 62/782,457, filed Dec. 20, 2018.
BACKGROUND
This disclosure is directed generally to vehicle access systems, and more particularly to vehicle access and power management systems and methods via machine learning.
Vehicles communicate with identification devices through a variety of communication interfaces. Vehicles and identification devices include environment detection sensors.
SUMMARY
A method for access to a vehicle according to an example of this disclosure includes receiving data from an identification device related to at least one device environment sensor of the identification device. At least one pattern associated with the received data is identified. An environment of the identification device based on feedback from the at least one device environment sensor is determined. The environment to the at least one pattern is compared. In response to the comparing step, access to the vehicle is allowed or denied.
In a further example of the foregoing, the method includes, in response to the comparing step, altering a search and listen pattern between the vehicle and the identification device.
In a further example of any of the foregoing, the method includes, in response to the comparing step, changing a power condition of a device of the vehicle.
In a further example of any of the foregoing, the device is a transceiver associated with a communication interface between the vehicle and the identification device.
In a further example of any of the foregoing, changing a power condition includes powering up the device.
In a further example of any of the foregoing, changing a power condition includes powering down the device.
In a further example of any of the foregoing, the method includes receiving data from the vehicle related to at least one vehicle environment sensor of the vehicle, identifying a second pattern associated with the received vehicle environment data, determining a vehicle environment of the vehicle based on feedback from the at least one vehicle environment sensor, and comparing the vehicle environment to the second pattern, and the allowing or denying access step is in response to the comparing the vehicle environment step.
In a further example of any of the foregoing, the identifying the pattern step is performed using machine learning.
In a further example of any of the foregoing, the machine learning utilizes an algorithm and model programmed into an ECU system of the vehicle.
A method for power management of a vehicle according to an example of this disclosure includes receiving data from an identification device related to at least one device environment sensor of the identification device. The method includes identifying at least one pattern associated with the received data. The method includes determining an environment of the identification device based on feedback from the at least one device environment sensor. The method includes, comparing the environment to the at least one pattern. The method includes, in response to the comparing, changing a power condition of a device of the vehicle.
In a further example of the foregoing, the device is a transceiver associated with a communication interface between the vehicle and the identification device.
In a further example of any of the foregoing, the changing a power condition includes powering up the device.
In a further example of any of the foregoing, the changing a power condition includes powering down the device.
In a further example of any of the foregoing, in response to the comparing step, the method includes altering a search and listen pattern between the vehicle and the identification device.
In a further example of any of the foregoing, the method includes identifying that the identification device is stationary and charging and reducing a frequency of a search and listen pattern between the vehicle and the identification device.
A power management and access system for a vehicle according to an example of this disclosure includes an ECU system. At least one lock is in communication with the ECU system. One or more devices is in communication with the ECU system. The ECU system is configured to utilize machine learning to receive data from an identification device related to at least one device environment sensor of the identification device, identify at least one pattern associated with the received data, determine an environment of the identification device based on feedback from the at least one device environment sensor, compare the environment to the at least one pattern, and, in response to the comparison, send a signal to control the at least one lock to allow or deny access to the vehicle.
In a further example of the foregoing, the ECU system is configured to change a power condition of the one or more devices in response to the comparison.
In a further example of any of the foregoing, the ECU system is configured to alter a search and listen pattern between the vehicle and the identification device in response to the comparison.
These and other features may be best understood from the following specification and drawings, the following of which is a brief description.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 schematically illustrates an example vehicle access system.
FIG. 2 schematically illustrates communication of the example vehicle access system of FIG. 1.
FIG. 3 schematically illustrates example interfaces and environment sensors of a vehicle.
FIG. 4 schematically illustrates example interfaces and environment sensors of an identification device.
FIG. 5 illustrates a flowchart of an example method for access of a vehicle.
FIG. 6 illustrates a flowchart of an example method for power management of a vehicle.
DETAILED DESCRIPTION
FIG. 1 schematically illustrates an example vehicle access and power management system 10 in a vehicle 12. The vehicle 12 may include one or more locks 14, such as door locks in the example shown, operable to engage or disengage to deny or allow access to the vehicle 12. The locks 14 are controllable by control signals from an engine control unit (ECU) system 16. The ECU system 16 may include one or more individual electronic control units that control one or more electronic systems or subsystems within the vehicle 12. In some examples, the ECU system 16 includes a vehicle access rights management electronic control unit. Although two locks 14 are shown in the illustrative example, more or fewer locks 14 may be utilized.
The ECU system 16 communicates with an identification device 24, in some examples to allow or deny access to the vehicle 12, as explained further below. Some example identification devices 24 may include smartphones or other handheld or wearable devices.
In some examples, the ECU system 16 may alternatively or additionally be in communication to change the power condition of devices 18, such as powering up and/or powering down the devices 18, as shown schematically. In some examples, the devices 18 are transceivers associated with interfaces 26 of communication between the ECU system 16 and the identification device 24. The ECU system 16 may change the power condition of a device 18 based on communication with the identification device 24.
The ECU system 16 may include one or more processors that executes, and memory that stores, computer-executable instructions for performing the various methods, functions, protocols, procedures, etc., described herein. The memory may include volatile, non-volatile memory, solid state memory, flash memory, random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electronic erasable programmable read-only memory (EEPROM), other variants, combinations thereof, and/or any other type(s) of memory suitable for providing the described functionality and/or storing computer-executable instructions for execution by the processor.
FIG. 2 schematically illustrates communication between the vehicle 12 and the identification device 24 through one or more interfaces 26. Example interfaces 26 may include one or more of LTE, Wi-Fi, Bluetooth Low Energy (BLE), Near-field communication, Qi, and GPS. The vehicle 12 includes one or more vehicle environment sensors 28. The identification device 24 includes one or more identification device environment sensors 30. The vehicle 12 and the identification device 24 may communicate data based on readings from the sensors 28, 30. In some examples, as shown, the ECU system 16 is in communication with the identification device 24 and the vehicle environment sensors 28. Based on the communications, the ECU system 16 can allow or deny access to the vehicle 12, change a power condition (e.g., power up or power down) of certain functions of the vehicle 12 to conserve power, and/or alter a search and listen pattern, in which the vehicle 12 periodically sends signals to and receives signals from the identification device 24.
As illustrated in FIG. 3, the interfaces 26A of the vehicle 12 may include LTE 31, Wi-Fi 32, BLE 34, GPS 36, Qi 38, and Near-field communication 40. The vehicle environment sensors 28 may include one or more of a temperature sensor 42, a light sensor 44, a camera 46, a radar sensor 48, a microphone 50, and an ultrasonic sensor 52. Other sensors 28 and interfaces 26A may be used in some examples.
As illustrated in FIG. 4, the interfaces 26B of the identification device 24 may include LTE 31, Wi-Fi 32, BLE 34, GPS 36, Qi 38, and Near-field communication 40. The device environment sensors 30 may include one or more of a microphone 54, a temperature sensor 56 a light sensor 58, a camera 60, an accelerometer 62, and a gyroscope 64. Other sensors 30 and interfaces 26B may be used in some examples.
Interface 26 selection and sensor 28, 30 utilization can vary for each environment that the vehicle 12 and identification device 24 are located in. In some examples, information from the sensors 28, 30 can indicate the proximity of the vehicle 12 to the identification device 24. The system 10 analyzes this data to determine whether the vehicle 12 and identification device 24 are in close proximity to one another, which can be used to allow or deny access to the vehicle 12, to change a power condition of certain functions of the vehicle 12 to use less power, and/or to alter a search and listen pattern.
The system 10 utilizes machine learning to learn from data from the sensors 28, 30, identify patterns associated with the data, and make decisions to execute various vehicle 12 functions with minimal human intervention. In some examples, the system 10, such as through the ECU system 16, may use machine learning to understand paths and environment transitions of the identification device 24 after leaving the vehicle 12 and execute various vehicle functions in response. The system 10 may utilize machine learning to receive data from an identification device 24 from one or more of the sensors 30, identify one or more patterns associated with the received data, determine an environment of the identification device 24 based on feedback from the one or more sensors 30, compare the environment to the one or more patterns, and, in response, allow or deny access to the vehicle 12. Alternatively or additionally, in response, the vehicle may change the power condition of a device 18. Alternatively or additionally, in response, the vehicle 12 may alter a search and listen pattern relative to the identification device 24. In some examples, alternatively or additionally, the machine learning may be based on data received from vehicle environment sensors 28.
In some examples, the system 10 may use machine learning based on sensor status, real time changes to vehicle 12 and identification device 24 environments, and historical data to predict proximity of the vehicle 12 and the identification device 24.
In some examples, even when the vehicle 12 and the identification device 24 are in close proximity, the system 10 may know through machine learning that the identification device 24 will not be used to gain access to the vehicle 12 for some time, and may deny access to the vehicle 12, power down devices 18, and/or reduce a polling frequency of a search and listen pattern to conserve power.
FIG. 5 illustrates a flowchart of an example method 100 for access of a vehicle 12, that may be utilized with the system 10 disclosed. The method 100 includes, at 102, receiving data from an identification device 24 from one or more device environment sensors 30. At 104, the method 100 includes identifying one or more patterns associated with the received data. At 106, the method 100 includes determining an environment of the identification device 24 based on feedback from the one or more device environment sensors 30. At 108, the method 100 includes comparing the environment to the one or more patterns. At 110, the method 100 includes, in response to the step 108, allowing or denying access to the vehicle 12. One or more of the steps of the method 100 be performed utilizing machine learning, such as with the ECU system 16 in some examples.
In some examples, the method 100 includes, in response to step 108, altering a search and listen pattern between the vehicle and the identification device. In some examples, the method 100 includes, in response to step 108, changing a power condition of a device 18.
In some examples, alternatively or additionally, the method 100 may be based on vehicle environment sensor 28 data. The method 100 may include receiving data from the vehicle 12 related to one or more vehicle environment sensors 28 of the vehicle 12, identifying a second pattern associated with the received vehicle environment data, determining a vehicle environment of the vehicle 12 based on feedback from the one or more vehicle environment sensors, and comparing the vehicle environment to the second pattern. The allowing or denying access step may be in response to the comparing the vehicle environment step.
FIG. 6 illustrates a flowchart of an example method 200 for power management of a vehicle 12, that may be utilized with the system 10 disclosed. The method 200 includes, at 202, receiving data from an identification device 24 from one or more device environment sensors 30. At 204, the method 200 includes identifying one or more patterns associated with the received data. At 206, the method 200 includes determining an environment of the identification device 24 based on feedback from the one or more device environment sensors 30. At 208, the method 200 includes comparing the environment to the one or more patterns. At 210, the method 200 includes, in response to the step 208, changing a power condition of a device 18 of the vehicle 12. Alternatively or additionally, the method 200 includes, at 212, in response to 208, altering a search and listen pattern between the vehicle 12 and the identification device 24.
Steps from the method 100 and the method 200 may be combined in some examples.
In some examples, in a home situation while the users are sleeping, the identification device 24 may be within close proximity to the vehicle 12. However, the system 10 may utilize machine learning to understand that the identification device 24 should not be expected to be used to gain access to the vehicle 12 soon. In some examples, the system may learn this from a detection that the identification device 24 is stationary and/or a detection that the identification device 24 is charging. For example, instead of keeping the search strategy in a quick response mode, if the identification device 24 is not moving or sitting on a wireless charging pad, based on feedback from various device environment sensors 30, then the vehicle 12 can switch into a longer search and listen pattern until the identification device 24 notifies the vehicle 12 of a status or environment change. In some examples, the system 10 may consider the time of day when the identification device 24 would normally start to be utilized.
In some examples, temperature sensors 42, 56 and light sensors 44, 58 on the identification device 24 and the vehicle 12 can be compared for alignment to see if both vehicle 12 and device 24 are in the same environment, such as an indoor or outdoor environment. When used in combination, the light sensor 58 can gate the temperature sensor 56 to know if the device is in pocket, bag, or out in the open.
In some examples, microphones 50, 54 can monitor the level of noise in the background, which can be used to compare the noise environment of the vehicle 12 to the noise environment to the identification device 24.
In some examples, one or more of accelerometer 62, compass & gyroscope 64 data can be used to track how the identification device 24 moved toward and/or away from the vehicle 12. These sensors used to classify walking, running, standing, etc.
In some examples, on the vehicle 12 side, radars and ultrasonic tracking can monitor the path of motion of the user and compare this with the identification device 24 path determination.
In an example in which a user walks from a vehicle 12 that is parked, the vehicle 12 can use its sensors 28, such as Advanced Driver Assist Sensors like cameras, RADAR, and LiDAR, to observe the trajectory the user takes take when leaving the vehicle 12. With repeated visits to the same location, which may be sensed with GPS in some examples, the vehicle 12 can begin to predict the departure path, time to return, and approach path of the authorized user. The identification device 24 may also have sensors 30 tracking the path as the identification device 24 leaves the vehicle 12. The identification device 24 can then collect the sensor 30 data over repeated visits to predict which sensor inputs are principle components to an algorithm that reliably classifies segments of the path and which of those segments can be used in an algorithm to predict a trajectory of the identification device 24, such as when the user will return to the vehicle 12.
In some examples, the pairings of the observed trajectory from the vehicle 12 and the sensed trajectory of the device 24 may vary from day to day, such as when the user parks in various nearby locations and enters or exits through a variety of access points of their destination. The identification device 24 shares its prediction of when and how it expects the user to be on his or her way to return to the vehicle 12. This sharing may be accomplished via indirect or direct means, depending on the proximity of the identification device 24 and the vehicle 12. Once the vehicle 12 has a high confidence input from the identification device 24 on a returning trajectory of the user, it can use its relevant sensors 28 and devices 18, such as wireless receivers, to confirm the approach of the user and the identification device 24.
The path segment classification may occur locally on the identification device 24, on an algorithm on the vehicle 12, or on a cloud service that incorporates data from many users and vehicles to continually tune a generic algorithm. In the cloud shared example, algorithm tuning benefits from large anonymous populations of users with highly correlated data for a given location. A set of algorithms may be highly optimized for the identification devices 24 and vehicles 12 parked in large common locations and are available to be exchanged with the vehicle 12 and the identification devices 24 in those areas. Blended approaches may also be achieved where locations are classified as public or private. In some examples, users may hold their path data and associated approach algorithms within their devices 24 and vehicles 12 for private locations and share those where they can benefit from and contribute to the crowdsourced solutions.
In some examples, the system 10 may prioritize among multiple authorized users. In an example in which multiple users are authorized to access a vehicle 12, the vehicle 12 may have a confidence level for each potential user and manage its sensor state according to their proximity For instance, if one user leaves the vehicle 12 in a long term parking situation and uses another form of transportation to move significantly farther away than the other authorized users, then the vehicle 12 prepares for the most relevant case of the nearest authorized user to approach. In some examples, the system 10 may focus on the prioritized user for the search and listen function.
In some examples, in the multiple authorized user scenario for the primary user leaving the vehicle 12 in a long term parking setting, there may be an option to set the remaining users to a confidence threshold below the one determined by their own “on approach” confidence threshold. That is, the system 10 may default to a polling or search strategy that matches with a “closest authorized user” priority; however, the system 10 would have the capability to invert the priority to force the system to set the search strategy to a lower power mode based on the request of the last user who has to return to the vehicle 12 on a very specific path which takes more time into consideration. Based on the changing schedules, the priority may be restored on request. This will have the effect of enabling a much lower power state and reduced availability of the wireless access systems to attack. The other authorized users with sufficient permissions are also able restore their “on approach” confidence threshold as needed.
In some examples, the system 10 may learn that a first authorized user's device 24 is in close proximity to the vehicle 12, and a second authorized user's device 24 is located farther away, such as in another city, state, province, country, etc. In these examples, the vehicle 12 may choose not to react to the second authorized user's device 24.
Vehicles 12 and identification devices 24 can further enhance the proximity detection through their ability to recognize changes in their environments to determine if the search and listen functions of the access system should be available and authorize actions. This could be any combination of wireless interface measurements or environment detection sensors available to the vehicle and the smart device.
The system 10 can adapt the search and listen management to the environmental state, changes through that environment, user behaviors on the path through the environment, and historical data on paths through the environment.
The systems and methods disclosed provide enhanced access, security, and power management through the use of machine learning.
Although the different examples are illustrated as having specific components, the examples of this disclosure are not limited to those particular combinations. It is possible to use some of the components or features from any of the examples in combination with features or components from any of the other examples.
A worker of ordinary skill in the art would understand that certain modifications could come within the scope of this disclosure.

Claims (17)

What is claimed is:
1. A method for access to a vehicle, the method comprising:
receiving data from an identification device related to at least one device environment sensor of the identification device;
identifying at least one pattern associated with the received data;
determining an environment of the identification device based on feedback from the at least one device environment sensor;
comparing the environment to the at least one pattern; and
in response to the comparing step, allowing or denying access to the vehicle;
identifying that the identification device is stationary and charging; and
reducing a frequency of a search and listen pattern between the vehicle and the identification device.
2. The method as recited in claim 1, the method comprising:
in response to the comparing step, altering a search and listen pattern between the vehicle and the identification device.
3. The method as recited in claim 1, the method comprising:
in response to the comparing step, changing a power condition of a device of the vehicle.
4. The method as recited in claim 3, wherein the device is a transceiver associated with a communication interface between the vehicle and the identification device.
5. The method as recited in claim 3, wherein the changing a power condition includes powering up the device.
6. The method as recited in claim 3, wherein the changing a power condition includes powering down the device.
7. The method as recited in claim 1, the method comprising:
receiving data from the vehicle related to at least one vehicle environment sensor of the vehicle;
identifying a second pattern associated with the received vehicle environment data;
determining a vehicle environment of the vehicle based on feedback from the at least one vehicle environment sensor; and
comparing the vehicle environment to the second pattern, wherein the allowing or denying access step is in response to the comparing the vehicle environment step.
8. The method as recited in claim 1, wherein the identifying the pattern step is performed using machine learning.
9. The method as recited in claim 8, wherein the machine learning utilizes an algorithm and model programmed into an ECU system of the vehicle.
10. A method for power management of a vehicle, the method comprising:
receiving data from an identification device related to at least one device environment sensor of the identification device;
identifying at least one pattern associated with the received data;
determining an environment of the identification device based on feedback from the at least one device environment sensor;
comparing the environment to the at least one pattern; and
in response to the comparing step, changing a power condition of a device of the vehicle;
identifying that the identification device is stationary and charging; and
reducing a frequency of a search and listen pattern between the vehicle and the identification device.
11. The method as recited in claim 10, wherein the device is a transceiver associated with a communication interface between the vehicle and the identification device.
12. The method as recited in claim 10, wherein the changing a power condition includes powering up the device.
13. The method as recited in claim 10, wherein the changing a power condition includes powering down the device.
14. The method as recited in claim 10, the method comprising:
in response to the comparing step, altering a search and listen pattern between the vehicle and the identification device.
15. A power management and access system for a vehicle, comprising:
an ECU system;
at least one lock in communication with the ECU system; and
one or more devices in communication with the ECU system,
wherein the ECU system is configured to utilize machine learning to receive data from an identification device related to at least one device environment sensor of the identification device,
identify at least one pattern associated with the received data,
determine an environment of the identification device based on feedback from the at least one device environment sensor,
compare the environment to the at least one pattern,
in response to the comparison, send a signal to control the at least one lock to allow or deny access to the vehicle,
identify that the identification device is stationary and charging, and
reduce a frequency of a search and listen pattern between the vehicle and the identification device.
16. The power management system as recited in claim 15, wherein the ECU system is configured to change a power condition of the one or more devices in response to the comparison.
17. The power management system as recited in claim 15, wherein the ECU system is configured to alter a search and listen pattern between the vehicle and the identification device in response to the comparison.
US16/377,697 2018-12-20 2019-04-08 Vehicle access and power management systems and methods via machine learning Active 2040-01-06 US11225222B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/377,697 US11225222B2 (en) 2018-12-20 2019-04-08 Vehicle access and power management systems and methods via machine learning

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862782457P 2018-12-20 2018-12-20
US16/377,697 US11225222B2 (en) 2018-12-20 2019-04-08 Vehicle access and power management systems and methods via machine learning

Publications (2)

Publication Number Publication Date
US20200198577A1 US20200198577A1 (en) 2020-06-25
US11225222B2 true US11225222B2 (en) 2022-01-18

Family

ID=71098369

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/377,697 Active 2040-01-06 US11225222B2 (en) 2018-12-20 2019-04-08 Vehicle access and power management systems and methods via machine learning

Country Status (1)

Country Link
US (1) US11225222B2 (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5969433A (en) * 1997-04-23 1999-10-19 Maggiora; David Raymond Theft preventing and deterring system and method using a remote station
US20150298654A1 (en) * 2013-08-19 2015-10-22 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US9986084B2 (en) * 2012-06-21 2018-05-29 Cellepathy Inc. Context-based mobility stoppage characterization
US10147004B2 (en) * 2011-05-03 2018-12-04 Ionroad Technologies Ltd. Automatic image content analysis method and system
US10169678B1 (en) * 2017-12-21 2019-01-01 Luminar Technologies, Inc. Object identification and labeling tool for training autonomous vehicle controllers
US10193695B1 (en) * 2018-04-30 2019-01-29 Merck Patent Gmbh Methods and systems for automatic object recognition and authentication
US10192171B2 (en) * 2016-12-16 2019-01-29 Autonomous Fusion, Inc. Method and system using machine learning to determine an automotive driver's emotional state
US10328896B2 (en) * 2017-05-18 2019-06-25 Ford Global Technologies, Llc Vehicle theft avoidance systems and associated methods
US20190220010A1 (en) * 2018-01-12 2019-07-18 Toyota Research Institute, Inc. Systems and methods for incentivizing user-aided improvement of autonomous vehicle control systems and methods of operating a vehicle using the same
US20190250626A1 (en) * 2018-02-14 2019-08-15 Zoox, Inc. Detecting blocking objects
US10414377B2 (en) * 2014-06-11 2019-09-17 Veridium Ip Limited System and method for facilitating user access to vehicles based on biometric information
US10503990B2 (en) * 2016-07-05 2019-12-10 Nauto, Inc. System and method for determining probability that a vehicle driver is associated with a driver identifier
US10539660B2 (en) * 2016-04-29 2020-01-21 GM Global Technology Operations LLC Self-learning system for reflective environments
US10546441B2 (en) * 2013-06-04 2020-01-28 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US10562492B2 (en) * 2002-05-01 2020-02-18 Gtj Ventures, Llc Control, monitoring and/or security apparatus and method
US10745018B2 (en) * 2018-09-19 2020-08-18 Byton Limited Hybrid user recognition systems for vehicle access and control
US10755083B2 (en) * 2018-05-04 2020-08-25 Hyundai Motor Company Terminal for vehicle and method for authenticating face

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5969433A (en) * 1997-04-23 1999-10-19 Maggiora; David Raymond Theft preventing and deterring system and method using a remote station
US10562492B2 (en) * 2002-05-01 2020-02-18 Gtj Ventures, Llc Control, monitoring and/or security apparatus and method
US10147004B2 (en) * 2011-05-03 2018-12-04 Ionroad Technologies Ltd. Automatic image content analysis method and system
US9986084B2 (en) * 2012-06-21 2018-05-29 Cellepathy Inc. Context-based mobility stoppage characterization
US20190082047A1 (en) * 2012-06-21 2019-03-14 Cellepathy Inc. Device context determination
US10546441B2 (en) * 2013-06-04 2020-01-28 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US20150298654A1 (en) * 2013-08-19 2015-10-22 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US10414377B2 (en) * 2014-06-11 2019-09-17 Veridium Ip Limited System and method for facilitating user access to vehicles based on biometric information
US10539660B2 (en) * 2016-04-29 2020-01-21 GM Global Technology Operations LLC Self-learning system for reflective environments
US10503990B2 (en) * 2016-07-05 2019-12-10 Nauto, Inc. System and method for determining probability that a vehicle driver is associated with a driver identifier
US10192171B2 (en) * 2016-12-16 2019-01-29 Autonomous Fusion, Inc. Method and system using machine learning to determine an automotive driver's emotional state
US10328896B2 (en) * 2017-05-18 2019-06-25 Ford Global Technologies, Llc Vehicle theft avoidance systems and associated methods
US10169678B1 (en) * 2017-12-21 2019-01-01 Luminar Technologies, Inc. Object identification and labeling tool for training autonomous vehicle controllers
US20190220010A1 (en) * 2018-01-12 2019-07-18 Toyota Research Institute, Inc. Systems and methods for incentivizing user-aided improvement of autonomous vehicle control systems and methods of operating a vehicle using the same
US20190250626A1 (en) * 2018-02-14 2019-08-15 Zoox, Inc. Detecting blocking objects
US10193695B1 (en) * 2018-04-30 2019-01-29 Merck Patent Gmbh Methods and systems for automatic object recognition and authentication
US10755083B2 (en) * 2018-05-04 2020-08-25 Hyundai Motor Company Terminal for vehicle and method for authenticating face
US10745018B2 (en) * 2018-09-19 2020-08-18 Byton Limited Hybrid user recognition systems for vehicle access and control

Also Published As

Publication number Publication date
US20200198577A1 (en) 2020-06-25

Similar Documents

Publication Publication Date Title
US12052357B2 (en) Smart lock unlocking method and related device
US10867459B2 (en) Wireless reader system
KR102612628B1 (en) Intelligent access system and method for vehicles
US10223849B2 (en) Intelligent wireless access system and method for a vehicle
US10752192B2 (en) Intelligent event system and method for a vehicle
US20170259786A1 (en) Remote Control of Vehicle Functionalities by Means of a Mobile Terminal
JP2021532371A (en) Systems and methods for determining real-time position
US20210026958A1 (en) System for adaptive vehicle security and response
CN107027096A (en) The tele-control system of vehicle
US11423719B2 (en) System and method for seamless access and intent identification using mobile phones
US11225222B2 (en) Vehicle access and power management systems and methods via machine learning
US10800381B2 (en) Vehicle access system battery and security management via interface diversity
KR102602767B1 (en) Vehicle remote control device and method based on user access direction tracking
CN118435252A (en) Proximity recognition
CN113313958A (en) Vehicle control method, device, vehicle, server and storage medium
KR20210005408A (en) Vehicle sharing system for autonomous vehicle, vehicle Sharing Server for the same
US20240073695A1 (en) Systems and methods for access control

Legal Events

Date Code Title Description
AS Assignment

Owner name: CONTINENTAL AUTOMOTIVE SYSTEMS, INC., MICHIGAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCHWEGLER, JASON BRIAN;PIERFELICE, MICHAEL ERIC;MARLETT, BRIAN JAMES;REEL/FRAME:048819/0757

Effective date: 20190408

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4